πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” Business Email Compromise: 5 ways this fraud could happen and what can be done to prevent it πŸ”

Millions of dollars and loads of personal information is being stolen through a growing threat known as Business Email Compromise (BEC).

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ In the Market for a MSSP? Ask These Questions First πŸ•΄

Not all managed security service providers are created equal. These questions can reveal whether you are hiring the right people to help secure your business.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Government Agency Partners on New Tool for Election Security πŸ•΄

The Cybersecurity and Infrastructure Security Agency has partnered with VotingWorks on an open source tool to aid election result audits.

πŸ“– Read

via "Dark Reading: ".
❌ Senators Demand Amazon Disclose Ring Privacy Policies ❌

Amazon's Ring data collection policies are in the spotlight.

πŸ“– Read

via "Threatpost".
πŸ•΄ Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities πŸ•΄

The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.

πŸ“– Read

via "Dark Reading: ".
⚠ Convicted Nigerian fraudster keeps a-fraudin’ from behind bars ⚠

He was supposed to be serving a 24-year sentence in the "maximum security" prison, not continuing the fraud... and going to parties.

πŸ“– Read

via "Naked Security".
⚠ Why do cryptocurrency scams work and how do you avoid them? ⚠

What are ICOs, why are they so popular and why do crooks love them so much?

πŸ“– Read

via "Naked Security".
❌ Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip ❌

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

πŸ“– Read

via "Threatpost".
❌ News Wrap: Amazon Ring Risks, Stalkerware, and D-Link Router Flaws ❌

From stalkerware to Amazon Ring doorbell outrage, Threatpost editors break down the top news stories of the week.

πŸ“– Read

via "Threatpost".
❌ Raccoon Stealer Malware Scurries Past Microsoft Messaging Gateways ❌

Financial institutions are in the crosshairs of hackers leveraging the malware to steal sensitive data.

πŸ“– Read

via "Threatpost".
⚠ Iran’s APT33 sharpens focus on industrial control systems ⚠

Iran's elite hacking group is upping its game, according to new evidence delivered at a cybersecurity conference this week.

πŸ“– Read

via "Naked Security".
⚠ Google plans to take Android back to β€˜mainline’ Linux kernel ⚠

Android could be returning to its roots.

πŸ“– Read

via "Naked Security".
πŸ•΄ The 5-Step Methodology for Spotting Malicious Bot Activity on Your Network πŸ•΄

Bot detection over IP networks isn't easy, but it's becoming a fundamental part of network security practice.

πŸ“– Read

via "Dark Reading: ".
πŸ” Friday Five: 11/22 Edition πŸ”

A phishing campaign targeting Microsoft Office 365 users, a mobile dining app breach, a medical group hacked, and more - catch up on the week's news with the Friday Five.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
πŸ” Security pros explain Black Friday best practices for consumers and businesses πŸ”

Consumers have to make sure not to fall prey to fraudulent coupons or deceptively spoofed retailer websites.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ 1.2B Records Exposed in Massive Server Leak πŸ•΄

A single server leaked four terabytes of personal data including social media profiles, work histories, and home and mobile phone numbers.

πŸ“– Read

via "Dark Reading: ".
❌ Data-Enriched Profiles on 1.2B People Exposed in Gigantic Leak ❌

Although the data was legitimately scraped by legally operating firms, the security and privacy implications are numerous.

πŸ“– Read

via "Threatpost".
πŸ•΄ When You Know Too Much: Protecting Security Data from Security People πŸ•΄

As security tools gather growing amounts of intelligence, experts explain how companies can protect this data from rogue insiders and other threats.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Target Seeks $74M in Data Breach Reimbursement from Insurance Company πŸ•΄

The funds would cover some of the money Target paid to reimburse financial institutions for credit card replacement after the 2013 breach.

πŸ“– Read

via "Dark Reading: ".